2015-11-02 01:04:00 by Tobias Nygren | Files touched by this commit (2) |
Log message:
Use ${COMPILER_INCLUDE_DIRS} instead of hardcoded /usr/include
|
2015-10-10 03:58:23 by Ryo ONODERA | Files touched by this commit (399) |
Log message:
Recursive revbump from textproc/icu
|
2015-08-18 09:31:20 by Thomas Klausner | Files touched by this commit (282) |
Log message:
Bump all packages that depend on curses.bui* or terminfo.bui* since they
might incur ncurses dependencies on some platforms, and ncurses just bumped
its shlib.
Some packages were bumped twice now, sorry for that.
|
2015-06-12 12:52:19 by Thomas Klausner | Files touched by this commit (3152) |
Log message:
Recursive PKGREVISION bump for all packages mentioning 'perl',
having a PKGNAME of p5-*, or depending such a package,
for perl-5.22.0.
|
2015-04-28 10:48:11 by Emmanuel Dreyfus | Files touched by this commit (3) |
Log message:
Fix crash in asterisk18 startup
The added patch fixes startup crash and was submitted upstream.
While there also remove the ban on i386, as it was tested to run fine.
|
2015-04-26 13:52:20 by Ryo ONODERA | Files touched by this commit (26) |
Log message:
Recursive revbump from databases/unixodbc.
|
2015-04-25 16:20:48 by Tobias Nygren | Files touched by this commit (495) |  |
Log message:
Recursive revbump following MesaLib update, categories a through f.
|
2015-04-12 05:35:39 by John Nemeth | Files touched by this commit (2) |  |
Log message:
Update to Asterisk 1.8.32.3: this is a security fix update.
The Asterisk Development Team has announced security releases for
Certified Asterisk 1.8.28, 11.6, and 13.1 and Asterisk 1.8, 11,
12, and 13. The available security releases are released as versions
1.8.28.cert-5, 1.8.32.3, 11.6-cert11, 11.17.1, 12.8.2, 13.1-cert2,
and 13.3.2.
The release of these versions resolves the following security vulnerability:
* AST-2015-003: TLS Certificate Common name NULL byte exploit
When Asterisk registers to a SIP TLS device and verifies the
server, Asterisk will accept signed certificates that match a
common name other than the one Asterisk is expecting if the signed
certificate has a common name containing a null byte after the
portion of the common name that Asterisk expected. This potentially
allows for a man in the middle attack.
For more information about the details of this vulnerability, please read
security advisory AST-2015-003, which was released at the same time as this
announcement.
For a full list of changes in the current releases, please see the Change Logs:
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.32.3
The security advisory is available at:
* http://downloads.asterisk.org/pub/security/AST-2015-003.pdf
Thank you for your continued support of Asterisk!
|
2015-04-06 10:17:41 by Adam Ciarcinski | Files touched by this commit (470) |
Log message:
Revbump after updating textproc/icu
|
2015-03-15 23:26:26 by John Nemeth | Files touched by this commit (3) |
Log message:
NOT_FOR_PLATFORM->BROKEN_ON_PLATFORM as requested by dholland@
|